IT Trenches

Okay, passwords may have reached the end of their useful life, but passwords are not gone yet. I know it is a challenge to come up with a unique secure password for all identities that we use to access secured resources. This is why a solution called PasswordCard comes across as a simple solution that is easy to implement at no additional cost or infrastructure changes. I’m sure that this is not an original idea but this website makes it simple to use. In a way, it is like a one-time pad.

A PasswordCard is a credit card size piece of paper which has symbols, characters and colors. You simply choose a symbol on the top row, choose a colored row and then use the characters shown to select the appropriate length of password. In the example shown below, I chose the Spade symbol then chose the green row and 8 characters for the password:$kKCSVQm. This is very simple to use and can be easily carried or posted without risk (unless the user marks their passwords in some manner).

Choose a symbol, a color and the number of characters

The string of numbers and letters across the bottom of the card is an identification code for this specific card. Each user’s card can be unique. If the card is damaged or lost, you can go back to the PasswordCard website and regenerate the same card if you have kept a record of this code.

Let me and other ITKE readers know if you use PasswordCard or any similar solution for secured passwords. Thanks for reading & let’s continue to be good network citizens.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States.
Privacy

Processing your reply...

There was an error processing your information. Please try again later.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States.
Privacy

Processing your reply...

About This Blog

Life in the trenches as a data network and information security manager. This blog covers real world issues affecting a real global network.